| We're a group of researchers and have just prepared a draft addressing a gap in cryptographic custody for autonomous agents. The problem: agents executing autonomously need key custody, but are the least trustworthy entities to hold keys alone. Existing solutions (hot wallets, smart accounts, TEEs, standard MPC) have fundamental gaps when applied to autonomous signing. Our approach: threshold ECDSA (CGGMP24, 2-of-3) with policy enforcement between distributed signing parties โ the server party evaluates constraints before participating in the interactive protocol. The full private key never exists. We're currently seeking expert feedback before publication, particularly on: - Threat model coverage (especially colluding parties) - Policy enforcement mechanism soundness - Practical deployment scenarios f you work on distributed cryptography, MPC protocols, or threshold signatures, we'd value your technical perspective. Review link from Overleaf shared. [link] [comments] |
You can get bonuses upto $100 FREE BONUS when you:
๐ฐ Install these recommended apps:
๐ฒ SocialGood - 100% Crypto Back on Everyday Shopping
๐ฒ xPortal - The DeFi For The Next Billion
๐ฒ CryptoTab Browser - Lightweight, fast, and ready to mine!
๐ฐ Register on these recommended exchanges:
๐ก Binance๐ก Bitfinex๐ก Bitmart๐ก Bittrex๐ก Bitget
๐ก CoinEx๐ก Crypto.com๐ก Gate.io๐ก Huobi๐ก Kucoin.
Comments